Read that file already yes. I was just curious what you thought of the course, does it complement OSCP well? Did you find OSCE more difficult?

Here a few other questions I came up with after thinking a bit more:

Web Application: - how deep does it go? Since they are in the process of developing a stand alone track as well. Will I learn anything new if I master the techniques of the "Web Application Hacker Handbook"?

0Day / Advanced Exploitation: - Windows only? - Does it touch on 64-bit?- If I am correct, OSCP goes just in the basics of buffer overflow exploitation. Does OSCE handle things like SafeSEH/DEP/ALSR bypass, heapspraying? A yes or no is enough, no details needed if sharing is forbidden by Offensive Security.

Nice write-up. I'm curious what percentage of people pass on the first attempt. It seems like nearly everyone I know semi-personally that has one has come up short the first time around (which really adds to the intimidation factor, especially considering how much outside prep you did beforehand).